Author(s) : Aansu Sara Abraham , Shanavaz.K.T , Nikhil G Kurup

Volume & Issue : VOLUME 2 / 2017 , ISSUE 2

Page(s) : 96-99


Authentication of color images in present world is one of the challenging task for image processing engineers and cryptographers due to its redundancy and spatial correlation. A new secure transmission method converts a given large volume secret image into mosaic picture of the same size. The mosaic image, which seems to be like the subjectively chosen target image is utilized as the disguise of the secret image, is obtained by separating the secret image into parts and changing their characteristics to be that of the target image. Skillful techniques are used for color transformation so that any outsider cannot identify the presence of the secret image. The visual quality of the mosaic image is calculated using the quality metric Structural Similarity Index Measure (SSIM).


color transformation, data hiding, image encryption, mosaic image, secure image transmission


[1]J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurcat. Chaos, vol. 8, no. 6, pp. 1259–1284, 1998.
[2]G. Chen,Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solit. Fract., vol. 21, no. 3, pp. 749–761, 2004.
[3]L. H. Zhang, X. F. Liao, and X. B. Wang, “An image encryption approach based on chaotic maps,” Chaos Solit. Fract., vol. 24, no. 3, pp. 759–765, 2005.
[4]H. S. Kwok and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos Solit. Fract, vol 32, no.4, pp, 1518-1529,2007
[5]S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos Solit. Fract., vol. 35, no. 2, pp. 408–419, 2008.
[6]D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaosbased image encryption algorithm,” Chaos Solit. Fract., vol. 40, no. 5, pp. 2191–2199, 2009.
[7]V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, “A robust and secure chaotic standard map based pseudorandom permutationsubstitution scheme for image encryption,” Opt. Commun., vol. 284, no. 19, pp. 4331–4339, 2011.
[8]C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit.., vol. 37, pp. 469–474, Mar. 2004
[9]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[10]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003.
[11]Y. Hu, H.-K. Lee, K. Chen, and J. Li, “Difference expansion based reversible data hiding using two embedding directions,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500–1512, Dec. 2008.
[12]V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989–999, Jul. 2009.
[13]X. Li, B. Yang, and T. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524–3533, Dec. 2011.
[14]W. Zhang, X. Hu, X. Li, and N. Yu, “Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression,” IEEE Trans. Image Process., vol. 22, no. 7, pp. 2775–2785, Jul. 2013.
[15]J. Fridrich, M. Goljan, and R. Du, “Invertible authentication,” Proc SPIE, vol. 3971, 2001, pp. 197–208.
[16]C. C. Chang, C. C. Lin, C. S. Tseng, and W. L. Tai, “Reversible hiding in DCT-based compressed images,” Inf. Sci., vol. 177, no. 13, pp. 2768–2786, 2007.
[17]S. Lee, C. D. Yoo, and T. Kalker, “Reversible image watermarking based on integer-to-integer wavelet transform,” IEEE Trans. Inf. Forens. Secur., vol. 2, no. 3, pp. 321–330, Sep. 2007.
[18]W.-H. Lin, S.-J. Horng, T.-W. Kao, P. Fan, C.-L. Lee, and Y. Pan, “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Trans. Multimedia, vol. 10, no. 5, pp. 746–757, Aug. 2008.
[19]Z. Wang, A. Bovik, H. Sheikh, E. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process. 13 (4) (2004) 600-612.